Client Agent 6.62 for Unix Vulnerability, Tested on a Debian 2.2.14, Client Agent has a hole allowing to execute an arbitrary code by root without its knowing. In the meantime, some conditions are necessary to exploit this vulnerability. Client Agent is used with ARCserveIT, the safe software. It must be installed on all the workstations. A global configuration file agent.cfg keep every sub-agents installed on your system. This file is in /usr/CYEagent, and receive the information from the sub-agent when the script /opt/uagent/uagensetup is run.
1daaedd6f40ccb604880096f68d1f14543064744d2f5c8d9d8a384929bef9ccd
RapidStream has hard-coded the 'rsadmin' account into the sshd binary in the appliance OS. The account has been given a 'null' password in which password assignment and authentication was expected to be handled by the RapidStream software itself. The vendor failed to realize that arbitrary commands could be appended to the ssh string when connecting to the SSH server on the remote vpn. This in effect could lead to many things, including the ability to spawn a remote root shell on the vpn.
4b922cd0b6565086e642ee2ff57903babce23e38618ab193b67f145f89db55fd
Faith Issue 13 - Local AXE10 Exchange Subsystems, Bypassing Physical Security, CCITT Signalling System No.6, BT Operator 999 Emergency Call Routing, Cellular Tracking Part II, UK Hand Scan of 0800 056 0xxx/1xxx, UK Hand Scan of 0808 100 2xxx, Plague v0.1
344dbe0b1bc71850805263dcab7c7e4ff415fb19f9123df8cad493e2568b6c01
Faith Issue 13 - Local AXE10 Exchange Subsystems, Bypassing Physical Security, CCITT Signalling System No.6, BT Operator 999 Emergency Call Routing, Cellular Tracking Part II, UK Hand Scan of 0800 056 0xxx/1xxx, UK Hand Scan of 0808 100 2xxx, Plague v0.1
814a7afbccac570db70a852ae88105006323c722c1b8781d3a1bcd77103f00db
HEH! Magazine Issue #4 (In Spanish). Shared Secret Systems, Funny Coding, CDMA vs TDMA, IPv6, and more discussed.
6b6f6132c146104b649448042696e3c16349f1aedd348ec51a32c59bb4c5eca1
sscan2k-pre5, Remote Auditing Tool that scans for more than 200 known vulnerabilities that are able to be found remotely, It depends on the operating system that the target host is running on to check for the vulnerabilities to prevent unecessary bandwidth to be used. Now comes with an easy to use configuration program much like xf86config, it also brings the option to use NMAP to guess operating system or to use sscan2k's scripted modules which are very updatable by the user. Multiple host scanning was improved.
142651be5ebe17ddb59e411574ccb8d9778eb8ce60349d3c16584cafead65519
MSADCS.DLL Checker is a program for Windows 9x that checks a web server for MSADCS.DLL and the location of the public directory. When the msadc2.pl RDS exploit is located in the same directory as MSADCS.DLL Checker, it will attempt to run the exploit on the target webserver.
547854dac0db09e8be775f2c9e2f26e8ad988ba699ab79ab48947751047992a7
Product: Account Manager, Versions: ALL including LITE and PRO haven't been able to test ENTERPRISE, OS: Unix and Winnt, Vendor: Notified, https://www.cgiscriptcenter.com/, The Problem: The Script allows any remote user access to the Administration Control Panel through overwriting the Admin Password with one of their own making.
da34cff8b8f0d5966a4b6803ba977cef75551738f799ae94a3f2632310f2b83e
nPULSE is a web-based network monitoring package for Unix-like operating systems. It can quickly monitor tens, hundreds, even thousands of sites/device s at a time on multiple ports. nPULSE is written in Perl and comes with its own mini web server for extra security.
4b59a903f9184441c77a5ce3dc3ad98ec9c6f36ba79547feb8a9549f270c48ad
MersyPop3.exe is a tool that can be used by network administrators to test the strength of pop3 passwords. A "Guessing" utility.
c80a2ed668a9ad501f1041d38f3a078caa0e5044311950c64835adcd3b486a2e
Omega v3 Beta is another new DDoS program.
44dc22110d1ba998a9af08b7cb232e45dd8cf53b02f90129fc5fd1d3d7c37312
elsa.pl is a script which will delete all usage statistics of an Elsa Microlink cablemodem. Disallowing any CMTS from polling the data.
c1aba9acb383b9b1495eedf882b3c3e84bbecc2763fc85328ff6529d65c0b7fb
sscan was given to buffer0verfl0w security by jsbach for the project to be continued for jsbach. From now on sscan will go as sscan2k. sscan2k now has updated vulnerability checks and the code has also been cleaned up. This scanner is now a release of HWA.
67bbe3fc726dad8001a1316048e0168304b62884accaa1d0ccdd859f189155a9